CN113435173B - Text generation method, related device and system - Google Patents

Text generation method, related device and system Download PDF

Info

Publication number
CN113435173B
CN113435173B CN202110593818.9A CN202110593818A CN113435173B CN 113435173 B CN113435173 B CN 113435173B CN 202110593818 A CN202110593818 A CN 202110593818A CN 113435173 B CN113435173 B CN 113435173B
Authority
CN
China
Prior art keywords
privacy
information
text
application program
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110593818.9A
Other languages
Chinese (zh)
Other versions
CN113435173A (en
Inventor
郝占峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202110593818.9A priority Critical patent/CN113435173B/en
Publication of CN113435173A publication Critical patent/CN113435173A/en
Application granted granted Critical
Publication of CN113435173B publication Critical patent/CN113435173B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Abstract

The method can generate the privacy text suitable for the application program from a privacy template database according to the relevant information of the application program provided by developers, including an online area, the name of the application program, functions or collected data and the like. Therefore, when the application program needs to be on line in different areas, a large amount of time cost is not needed to be spent on inquiring privacy laws and regulations in different areas, the privacy texts meeting the privacy laws and regulations in multiple areas can be easily obtained through the method, the privacy texts are rapidly generated, the development efficiency of the privacy texts is improved, and the development cost of the privacy texts is reduced.

Description

Text generation method, related device and system
Technical Field
The present application relates to the field of terminal and communication technologies, and in particular, to a text generation method, a related device and a system.
Background
For an application that is first opened by a user, the application may display privacy terms, and the user may be able to use the application normally after the user reads and agrees to the privacy terms. The privacy term is used for showing the specification or statement of the application program on the user information collection, use and other behaviors, and is a window for a user to know about the application program and the service provided by the application program.
With the constant popularization and development of global economic integration and internet technology, application programs are gradually oriented to users in various regions around the world. Due to the difference of privacy laws and regulations of different regions, different requirements exist for the privacy terms of the application program in different regions. When an application program is online facing different areas in the world, how to quickly provide the application program to meet privacy rules of privacy laws and regulations of different areas is a problem to be solved urgently at present.
Disclosure of Invention
The application provides a text generation method, a related device and a system, which can generate a privacy text meeting privacy laws and regulations of different areas according to different online areas of an application program, realize the quick generation of the privacy text, improve the development efficiency of the privacy text and reduce the development cost of the privacy text.
In a first aspect, an embodiment of the present application provides a text generation method, where the method includes: the electronic equipment receives first information of a first application program, wherein the first information comprises: indication information of the first area, and indication information of the first function or first user information; the first user information provides information required by the first function for the first application program; the electronic equipment acquires a first template according to the first information, wherein the first template describes a rule for acquiring user information by an application program providing service in the first area; the electronic equipment generates a first privacy text according to the first information and the first template, wherein the first privacy text is used for requesting a user to grant the first application program the authority to acquire the first user information in the first area.
In this embodiment of the present application, the first application may refer to a target application developed or updated by a developer, and the first information may refer to information related to the target application, where the information may include: name of the target application, company name, functional description of the target application, personal data, data storage location, storage period, online area of the target application, other relevant information, and the like. The first template may refer to a privacy template, and the electronic device may search the first template from a plurality of privacy templates according to the first information, and generate a privacy text suitable for the target application according to the first template.
Therefore, the electronic equipment can search the privacy template applicable to the online area according to the online area of the application program, so that the privacy text applicable to the privacy laws and regulations of the online area is generated, the development of the privacy text by investing a large amount of manpower and energy is avoided, and convenience is provided for developers to obtain the privacy text.
In a specific implementation manner, the electronic device receives second information of the first application program, wherein the second information indicates that: a second region, and the first user information; the electronic equipment acquires a second template according to the second information, wherein the second template describes a rule for acquiring user information by an application program providing service in the second area; and the electronic equipment generates a second privacy text according to the second information and the second template, wherein the second privacy text is used for requesting the user to grant the authority of the first application program for acquiring the first user information in the second area.
Therefore, when the application program needs to be online in different areas, the electronic equipment can generate privacy texts meeting privacy laws and regulations of the different online areas according to the different online areas.
In a specific implementation manner, the first information includes indication information of the first function, and the first template describes a rule for obtaining user information when the application provides the first function; alternatively, the first privacy template describes a rule for an application providing a service in the first zone to obtain the first user information.
Since the privacy text may state rules for the application to collect, process, use, store, share, transfer, or publicly disclose relevant personal information, the privacy text is used to indicate to the user that the application is entitled to obtain user information before using the application. The first template is used as a privacy template for generating a first privacy text corresponding to the first application, and the content of the first template may include rules for collecting, processing, using, storing, sharing, assigning or disclosing user data under different functions of the application, or the first template may directly include rules for collecting, processing, using, storing, sharing, assigning or disclosing user data by the application without distinguishing different functions of the application.
In a particular implementation, the first information includes one or more of: the name of the first application program, the indication information of the first function, the first user information, the storage location of the first user information, the storage period of the first user information, the name, address or contact information of the developer of the first application program.
In a specific implementation manner, the receiving, by the electronic device, first information of a first application program specifically includes: the electronic equipment receives indication information of the first area; the electronic equipment outputs prompt information, and the prompt information is used for prompting to input the indication information of the first function or the first user information; the electronic equipment receives indication information of the first function or the first user information.
Because the different online areas need different related information of the application program provided by the developer, the electronic device can prompt the user to input different related information of the application program according to the different online areas input by the developer. In this way, the relevant information of the target application program can be acquired in a targeted manner.
In a specific implementation manner, the electronic device receives a first template sent by a first server.
The privacy templates can be stored in the privacy template database in the server in a centralized manner or in the electronic equipment in a centralized manner, when privacy laws and regulations change or privacy risks exist in the privacy templates, the privacy templates can be changed in time and sent to the electronic equipment so that the electronic equipment can generate privacy texts according with the privacy laws and regulations, and the privacy templates can be updated in time.
In a specific implementation manner, after the electronic device generates the first private text according to the first information and the first template, the method further includes: the electronic device receiving feedback information for the first private text, the feedback information indicating an error in the first private text; the electronic equipment sends the feedback information to a first server, and the feedback information is used for the first server to update the stored first template or used for the first server to search the private text generated by using the first template.
According to the method, the privacy text suitable for the target application program can be generated, the error information in the privacy text fed back by developers or other users can be received, the privacy template with the error can be updated in time according to the information, or other privacy texts with the same error can be found out, so that the quality of the privacy text can be better controlled, the problems in the privacy text can be checked in time, and the developers can be prevented from wasting too much time and energy on quality control of the privacy text.
In a specific implementation manner, after the electronic device generates the first private text according to the first information and the first template, the method further includes: the electronic equipment sends the first privacy text to a second server, and the second server is used for providing a downloading service of the first application program.
After the electronic device obtains the first privacy text, the developer may upload the first privacy text to a server corresponding to an online application download platform of the target application program, and when the user downloads or updates the target application program from the application download platform, the developer may obtain and view the first privacy text.
In a second aspect, embodiments of the present application provide an electronic device, which includes a display screen, one or more processors, and one or more memories; wherein the display screen, the one or more memories and the one or more processors are coupled to the one or more processors, the one or more memories being configured to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the method as described in the first aspect or any specific implementation of the first aspect.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, which includes instructions, and when the instructions are executed on an electronic device, the electronic device is caused to perform the method as described in the first aspect or any specific implementation manner of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer program product, which when run on a computer, causes the computer to perform the method as described in the first aspect or any specific implementation manner of the first aspect.
The present application can further combine to provide more implementations on the basis of the implementations provided by the above aspects.
Drawings
FIGS. 1A and 1B are user interfaces involved in opening a downloaded application by an electronic device for the first time;
fig. 2 is a schematic hardware structure diagram of an electronic device 100 according to an embodiment of the present disclosure;
fig. 3 is a block diagram of a software structure of the electronic device 100 according to an embodiment of the present disclosure;
FIGS. 4A-4G, 5A-5B, 6A-6B, and 7A-7D are some of the user interfaces provided by embodiments of the present application;
fig. 8 is a schematic structural diagram of a text generation system according to an embodiment of the present application;
fig. 9 is a flowchart of a text generation method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described in detail and clearly with reference to the accompanying drawings. In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" in the text is only an association relationship describing an associated object, and means that three relationships may exist, for example, a and/or B may mean: three cases of a alone, a and B both, and B alone exist, and in addition, "a plurality" means two or more than two in the description of the embodiments of the present application.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature, and in the description of embodiments of the application, unless stated otherwise, "plurality" means two or more.
When the user opens the downloaded or updated application program for the first time, the application program displays the privacy terms and prompts the user to read and agree to the privacy terms. The privacy terms may state rules for collecting, processing, using, storing, sharing, transferring, or publicly disclosing relevant personal information by the application, and may be used to indicate to the application that the user is entitled to obtain the user information before using the application.
Fig. 1A, 1B illustrate some of the user interfaces involved when an electronic device first opens a downloaded application.
Fig. 1A shows a prompt box 01 displayed by a downloaded application when the electronic device opens the application for the first time, where the prompt box 01 is used to prompt a user to read and agree to "privacy terms" to enable the application to be used normally. When the electronic device receives a user operation acting on the "privacy clause", the electronic device displays a user interface as shown in fig. 1B, which exemplarily shows a part of the contents of the "privacy clause". The content of the privacy clause may include: data collected by the application, the use of the data in the application, the manner in which the data is protected, the rights of the user, applicable laws and jurisdictions, and the like.
It can be seen that a developer needs to provide privacy provisions applicable to privacy laws and regulations when developing or updating an application. However, there are certain differences in privacy laws and regulations in different areas. The developer needs to combine the privacy laws and regulations of the online area of the application program to finally make appropriate privacy terms.
One way to achieve this is for developers to work with privacy teams, such as law workers, privacy engineers, etc., who specialize in privacy laws and regulations, and work together to make privacy terms applicable to the application. The privacy laws and regulations in the area are inquired and collected by the privacy team, meanwhile, developers need to inform the privacy team of the relevant content of the developed application program, the privacy team can inquire and collect the relevant content, and the developers need to know the laws to a certain extent, so that the information needed by the privacy team can be provided.
That is to say, the establishment of the privacy provision requires a great deal of manpower, including developers, legal staff, privacy engineers and other related personnel, and a great deal of effort, and the establishment of the privacy provision of each application requires a privacy team to inquire and collect the privacy laws and regulations of the related area, and combine the functions of the application to establish the privacy provision meeting the requirements, and since the privacy laws and regulations of different areas are not fixed, the developers also need to update the privacy provision of the application in time according to the changes of the laws and regulations of the areas.
In the embodiment of the present application, the privacy term may also refer to a privacy policy, a privacy agreement, a privacy policy term, a privacy statement, a user agreement, a user notice, and the like, which is not limited in the embodiment of the present application.
In the following embodiments of the present application, the text content included in the privacy clauses may be referred to as privacy text.
The embodiment of the application provides a text generation method, which is oriented to developers developing application programs. The method can generate the privacy text suitable for the application program from the privacy template database according to the related information of the application program provided by the developer. Moreover, the method can also output the generated privacy text for relevant personnel to check, and update the privacy template database according to the modified privacy text of the relevant personnel, or update the privacy template database when privacy laws and regulations change or privacy risks exist in the privacy template. In addition, the method can also carry out centralized management on the generated privacy texts, search and modify other privacy texts with the same problems with the privacy texts according to the feedback information of the privacy texts, and prompt developers corresponding to the privacy texts to update the privacy texts.
The relevant information of the application program may include: name of the application, company name, functional description of the application, personal data, data storage location, storage period, online area of the application, other relevant information, and the like.
The method may also provide a user information database for storing developer related information (e.g., user ID, device ID, contact, etc.) and application related information input by the developer.
The privacy template database comprises a plurality of privacy templates which are made by a privacy team according to searched and collected privacy laws and regulations, and the privacy team can comprise personnel who specialize in the privacy laws and regulations, such as legal personnel and privacy engineers. Reference may be made to subsequent embodiments with particular regard to the relationship of the privacy template and the privacy text.
The related personnel refer to personnel related to the private text, and comprise developers, privacy teams and the like.
It can be understood that, in practical application, the method may be presented to the user in the form of a web page, and the user may obtain the private text suitable for the application by inputting the relevant information of the application into the web page. Alternatively, the privacy text may be presented to the user in the form of an application program (hereinafter referred to as a development application program) in the electronic device, and the user may obtain the privacy text applicable to the target application program by opening the development application program and inputting the relevant information of the application program (i.e., the application program developed or updated by the developer, hereinafter referred to as the target application program). The present application does not limit the expression of the method, and in the following examples of the present application, the expression of an application program is exemplified.
The method can realize the rapid generation of the privacy text and the centralized management of the privacy text, improve the development efficiency of the privacy text, reduce the development cost of the privacy text, and can update or modify the privacy text in time when the privacy text is no longer suitable for the application program, thereby ensuring the legality and normalization of the privacy text.
Fig. 2 shows a hardware structure diagram of the electronic device 100 provided in the embodiment of the present application.
The electronic device 100 may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a cellular phone, a Personal Digital Assistant (PDA), an Augmented Reality (AR) device, a Virtual Reality (VR) device, an Artificial Intelligence (AI) device, a wearable device, a vehicle-mounted device, a smart home device, and/or a smart city device, and the specific type of the electronic device is not particularly limited by the embodiments of the present application.
The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a key 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
In some embodiments, the processor 110 may generate the privacy text suitable for the application from the privacy template data according to the relevant information of the application, and update the privacy template database according to the modified privacy text.
The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
It should be understood that the connection relationship between the modules according to the embodiment of the present invention is only illustrative, and is not limited to the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional modules, independent of the processor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the electronic device 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), global Navigation Satellite System (GNSS), frequency Modulation (FM), near Field Communication (NFC), infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, demodulates and filters electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, the mobile communication template 150 and the wireless communication module 160 may receive the privacy template transmitted by the server, and transmit the information related to the application and the information related to the developer to the server. Furthermore, the mobile communication template 150 and the wireless communication module 160 may also transmit feedback information or privacy text to the server and receive the privacy text or prompt information transmitted by the server.
In some embodiments, antenna 1 of electronic device 100 is coupled to mobile communication module 150 and antenna 2 is coupled to wireless communication module 160 so that electronic device 100 can communicate with networks and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), general Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), long Term Evolution (LTE), BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The electronic device 100 implements display functions via the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
In some embodiments, display screen 194 may be used to display a user interface provided by electronic device 100, such as a user interface provided by a development application. The details of the content displayed on the display screen can be found in the user interface provided in the subsequent UI embodiment and its related content.
The internal memory 121 may include one or more Random Access Memories (RAMs) and one or more non-volatile memories (NVMs).
In some embodiments, the internal memory 121 may be used to store the privacy text generated by the electronic device 100 and related information of the application provided by the developer, such as the name of the application, the name of a company, the functional description of the application, personal data, the data storage location, the storage period, the online area of the application, other related information, and the like, and related information of the developer, such as a user ID, a device ID, a contact address, and the like. In addition, the internal memory 121 may also be used to store a privacy template database, which contains one or more privacy templates.
The random access memory may include static random-access memory (SRAM), dynamic random-access memory (DRAM), synchronous dynamic random-access memory (SDRAM), double data rate synchronous dynamic random-access memory (DDR SDRAM), such as fifth generation DDR SDRAM generally referred to as DDR5 SDRAM, and the like; the nonvolatile memory may include a magnetic disk storage device, a flash memory (flash memory).
The FLASH memory may include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc. according to the operation principle, the FLASH memory may include single-level cell (SLC), multi-level cell (MLC), three-level cell (TLC), four-level cell (QLC), etc. according to the potential order of the memory cell, and the FLASH memory may include universal FLASH memory (english: UFS), embedded multimedia memory Card (mc em), etc. according to the storage specification.
The random access memory may be read and written directly by the processor 110, may be used to store executable programs (e.g., machine instructions) of an operating system or other programs in operation, and may also be used to store data of users and applications, etc.
The nonvolatile memory may also store executable programs, data of users and application programs, and the like, and may be loaded into the random access memory in advance for the processor 110 to directly read and write.
The electronic device 100 may implement audio functions via the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
The touch sensor 180K is also called a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation acting thereon or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device 100, different from the position of the display screen 194.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic apparatus 100 may receive a key input, and generate a key signal input related to user setting and function control of the electronic apparatus 100.
The electronic device may be a portable terminal device, such as a mobile phone, a tablet computer, a wearable device, or the like, which carries an iOS, android, microsoft, or other operating system, and may also be a non-portable terminal device such as a Laptop computer (Laptop) with a touch-sensitive surface or touch panel, a desktop computer with a touch-sensitive surface or touch panel, or the like. The software system of the electronic device 100 may employ a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the present invention uses an Android system with a layered architecture as an example to exemplarily illustrate a software structure of the electronic device 100.
Fig. 3 is a block diagram of the software configuration of the electronic apparatus 100 according to the embodiment of the present invention.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages.
As shown in fig. 3, the application package may include development applications, calendar, phone calls, maps, navigation, WLAN, bluetooth, music, video, short message, etc. applications.
The development application program can be used for generating privacy texts suitable for the target application program from the privacy template database according to the related information of the target application program provided by a developer. The development application program can also be used for outputting the generated privacy text, updating the privacy template database according to the modified privacy text of the related personnel, sending feedback information to the server, and receiving prompt information or the privacy text sent by the server.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 3, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and answered, browsing history and bookmarks, phone books, etc.
In some embodiments, the content provider may be used to obtain private text generated or saved by the electronic device 100.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
In some embodiments, the view system may be used to build a user interface provided by a development application.
The phone manager is used to provide communication functions of the electronic device 100. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
In some embodiments, the notification manager may be configured to display the reminder information or the private text sent by the server in the form of a notification in the status bar.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
Fig. 4A-4G, fig. 5A-5B, fig. 6A-6B, and fig. 7A-7D illustrate some of the user interfaces provided by embodiments of the present application.
Some user interfaces implemented on the electronic device 100 when the development application generates the private text for the first time according to the information about the target application input by the developer are described below with reference to fig. 4A to 4G.
Fig. 4A illustrates an example of the user interface 21 provided by the development application when the electronic device 100 opens the development application, where the user interface 21 may be a main interface of the development application. The developer may enter the user interface 21 by registering or logging into an account.
As shown in fig. 4A, the user interface 21 may include: a user information bar 211, a function display bar 212, and a menu bar 213. The user information column 211 is used to show the related information of the developer who registers and logs in the development application, such as the user avatar, the user ID, and the like. The function display column 212 is used for displaying functions in the development application, including a new text function 212A, a text management function 212B, an application update function 212C, and an error correction and feedback function 212D.
The new text function 212A may be used for a developer to generate private text for a developed application (e.g., a target application) for the first time. In the new text function 212A, the developer may obtain private text suitable for the target application by inputting relevant information of the target application.
The text management function 212B may be used to manage all private text generated by the development application in the account. The developer may view, download, and forward the private text via text management function 212B.
The application update function 212C may be used to update all private text generated by the development application in the account. For example, the developer may use the application update function 212C to obtain updated privacy text when privacy laws, regulations, or updated content exists for the target application.
The error correction and feedback function 212D may be configured to receive feedback information of the generated private text from the developer, and the development application may find and modify another private text having the same problem as the private text according to the problem indicated in the feedback information, where the other private text includes the private text generated by the development application through a different account by another developer.
The menu bar 213 includes: home option 213A, message option 213B, local option 213C. The home page option 213A may be used to monitor a user interface corresponding to the triggered switching home page. The user interface corresponding to the home page may refer to the user interface 21, that is, when the electronic device 100 opens the development application, the development application starts the user interface 21 corresponding to the home page by default. Message option 213B may be used to listen to the user interface corresponding to the trigger switch message. The user interface corresponding to the message is used for displaying the messages received by the development application program, and developers can view and process the messages through the user interface corresponding to the message. Local option 213C may be used to listen for a user interface that triggers a switch locally corresponding. The local corresponding user interface may be used for developers to manage local accounts.
As shown in fig. 4A, the electronic device 100 may receive a touch operation applied to the new text function 212A, and in response to the operation, the electronic device 100 displays the user interface 31 shown in fig. 4B. The user interface 31 is used for displaying information to be filled in by a developer and providing an interface through which the developer can input text.
As shown in fig. 4B, the user interface 31 may include: a return control 311, a confirmation control 312, and an information filling area 313. Wherein the return control 311 is used to return to a previous level of user interface, e.g., user interface 21. The confirmation control 312 is used to enter the next level of user interface after the developer completes the completion of the filling in of information. The information filling area 313 may list a plurality of pieces of information that need to be filled out by the developer, such as the name of the application, the online area, the company name, the contact address, the function of the application (including the function type, the function name, the data that the function needs to collect, and the like). The information filling area 313 includes a first function list 313A and an additional addition control 313B. The first function list 313A is used to show list information that one of the functions included in the application needs to be filled in. The addition control 313B is used to add a list shown in, for example, the first function list 313A. Therefore, the developer can fill in the corresponding amount of function information according to the actual owned functions of the target application program. The development application program can search the privacy template database according to the relevant information of the application programs filled by developers, and generate the privacy text.
In some embodiments, the electronic device 100 may determine the information that the developer needs to fill out based on the online area of the target application. Specifically, after the electronic device 100 displays the user interface shown in fig. 4A, and receives the touch operation applied to the new text function 212A, in response to the touch operation, the electronic device 100 may display a user interface including a text input area for a developer to fill in or select an online area of the target application, and the electronic device 100 may determine information that the developer needs to fill in, for example, a name of the application, a company name, a contact information, and the like, according to the online area, and display a user interface similar to that shown in fig. 4B for the developer to complete filling in the information.
Fig. 4C illustrates the user interface 31 displayed by the electronic device 100 after the developer completes the filling of the information. It can be seen that the name of the application program is "Camera", the online area of the application program is "china", the Company name is "Company1", the contact is "132XXXXXXXX", the application program includes a function "portrait beautifying function", the function type of the "portrait beautifying function" is "photographing", and the data to be acquired by the "portrait beautifying function" includes "photographing parameter adjustment records, skin and facial parameters, and facial recognition features". The electronic device 100 may store the relevant information of the application program filled by the developer in the user information database, search the privacy template in the privacy template database according to the information, and generate the privacy text according to the privacy template. For example, the electronic device 100 may search the privacy template database according to the online area filled by the developer, that is, "china", for the privacy template corresponding to "china", and the electronic device 100 fills the relevant information of the application program into the privacy template and supplements some general text descriptions, so as to obtain the privacy text applicable to the target application program.
As shown in fig. 4C, after the developer completes the filling of the information, the electronic device 100 may receive a touch operation applied to the confirmation control 312, and in response to the touch operation, the electronic device 100 displays the user interface 41 shown in fig. 4D. The user interface 41 is used to prompt the developer that the currently developed application is generating private text based on the information about the application that the developer filled out.
As shown in fig. 4D, the user interface 41 may include: returning to control 411, prompt information 412. The return control 411 may be used to interrupt the process of generating the private text for the currently developed application, return to the previous user interface, i.e. the user interface 31, and allow the developer to refill the relevant information of the application or further return to the previous user interface, i.e. the user interface 21. After a period of time, e.g., 2 seconds, in which the electronic device 100 displays the user interface 41 as shown in fig. 4D, the electronic device 100 may display a prompt box 413 as shown in fig. 4E in the user interface 41. The prompt box 413 is used to prompt the developer that the privacy text is currently generated, and the developer can check whether the privacy text is correct.
As shown in fig. 4E, prompt box 413 may include a confirmation control 413. When electronic apparatus 100 detects a user operation on confirmation control 413, in response to the operation, electronic apparatus 100 displays user interface 51 as shown in fig. 4F. The user interface 51 displays the private text generated by the development application, and the developer can confirm the correctness of the private text or modify the private text through the user interface 51.
As shown in fig. 4F, the user interface 51 includes: private text 511, modification area 512, completion control 513. The privacy text 511 can be used to listen to user operations that trigger online modification and downloading of the privacy text. The privacy text 511 may include: an online modification control 511A and a download control 511B. The online modification control 511A may be used to open the privacy text, enabling the developer to modify the privacy text online. Download control 511B may be used to download the private text locally. The modification area 512 may be used for developers to upload modified privacy text into the development application. The completion control 513 may be configured to end the review of the privacy text by the developer, and send the privacy text modified by the developer to the server for the privacy team to perform secondary confirmation. And then, after the common confirmation of the developer and the privacy team, the server side sends the finally confirmed privacy text to the development application program, and the developer can obtain the finally confirmed privacy text through the development application program.
It can be seen that fig. 4A to 4G above illustrate that, after receiving the information related to the application program input by the developer, the electronic device 100 outputs a privacy text according to the information, where the privacy text can be checked and modified by the developer, and after the confirmation of the developer, the privacy text is sent to a privacy team for secondary confirmation, so as to ensure the validity and normalization of the privacy text.
It will be appreciated that the process described above for the developer and privacy team to validate the privacy text is an optional step. That is, the electronic device 100 may only execute the user interfaces shown in fig. 4A-4F described above, and after the electronic device 100 outputs the private text, there is no need for a process of confirming the private text.
That is to say, the developer can obtain the private text suitable for the target application program only by providing some relevant information of the target application program for the development application program, so that the problems of long generation period and labor consumption of the private text are solved, the development efficiency of the private text is improved, the development cost of the private text is reduced, and the operation flow of the developer is facilitated.
Fig. 5A-5B illustrate some of the user interfaces implemented on the electronic device 100 when developing an application to manage private text.
The user interface 21 shown in fig. 5A is a main interface for developing an application. When the electronic device 100 acquires the privacy text finally confirmed by the privacy team, an identifier 212E may appear in the text management function 212B, where the identifier 212E is used to prompt a developer that the privacy text finally confirmed by the privacy team is currently acquired, and the privacy text may be uploaded to a developed target application program for use when the target application program is online.
As shown in fig. 5A, the electronic apparatus 100 detects a touch operation applied to the text management function 212B, and in response to the operation, the electronic apparatus 100 displays the user interface 61 shown in fig. 5B. The developer may preview, download, forward the private text generated by the development application through the user interface 61.
As shown in fig. 5B, the user interface 61 includes: a return control 611, a new text area 612, and a history text area 613. Where a return control 611 may be used to return to a previous level of user interface, e.g., user interface 21. The new text area 612 and the history text area 613 may be used to display a private text list corresponding to all private texts received by the electronic device 100, where the new text area 612 contains private texts that are not viewed, downloaded, or forwarded by the developer, and the history text area 613 contains private texts that are viewed, downloaded, or forwarded by the developer. In addition, each line of privacy text list has a control which can be touched by a developer, and the private text can be checked, downloaded or forwarded by the developer through the control. If the new text area 612 includes: preview control 612A, download control 612B, and forward control 612C. The preview control 612A may monitor a user operation that triggers online preview of the private text, the download control 612B may monitor a user operation that triggers downloading of the private text, the electronic device 100 may download the private text to a local storage area for a developer to upload to a target application, and the forwarding control 612C is used to obtain a link corresponding to the private text.
In some embodiments, the development application may save private text generated by different accounts to a private text database in the cloud server. Specifically, the private texts may be stored according to a user ID, and when the electronic device 100 receives a download operation of a developer for one of the private texts, the electronic device 100 may send a download request including the user ID and the private text ID to a cloud server to request to acquire the private text.
That is to say, the development application may include a privacy text management function, and a developer may view, download or forward the privacy text generated by the development application through the function, so as to facilitate management of the privacy text by the developer.
Fig. 6A-6B illustrate some of the user interfaces implemented on the electronic device 100 when developing an application to update private text.
The user interface 21 shown in fig. 6A is a main interface for developing an application. As shown in fig. 6A, when the electronic apparatus 100 detects a touch operation on the text update function 212C, in response to the operation, the electronic apparatus 100 displays the user interface 71 shown in fig. 6B.
As shown in fig. 6B, the user interface 71 may include: the application list 711. The application list 711 may be used to show the application list corresponding to the privacy text historically generated by the developer. When the electronic apparatus 100 detects an operation acting on the list in which one of the application programs is located, the electronic apparatus 100 may expand the executable function of the application program. As shown in fig. 6B, the application list 711 includes a first application list 712, the electronic device 100 detects a touch operation applied to the first application list 712, displays a law detection function 712A, and an information modification function 712B, where the law detection function 712A is used to detect whether a privacy law corresponding to a privacy text of the application is changed, and if the privacy law corresponding to the privacy text of the application is changed, the electronic device 100 may obtain a modified privacy text according to the latest privacy law. The information modification function 712B may be used to, when the developer updates the target application again, modify the relevant information of the application for the function or relevant information modified by the target application, and generate the privacy text conforming to the updated target application again. For example, after the electronic device 100 detects a touch operation on the information modification function 712B, in response to the operation, the electronic device 100 may display a user interface as shown in fig. 4C, and the developer may modify the information filled in for the history again and generate a new private text.
It can be understood that, in order to implement the rule detection function 712A to detect the change of the privacy rules corresponding to the privacy text, the privacy rules need to be continuously updated by the privacy team, so as to ensure that the privacy rules in different areas recorded in the privacy template database are in the latest version.
In some embodiments, when the privacy template database is updated due to changing privacy laws, regulations, the server may transmit the updated privacy template database to the electronic device 100, and the electronic device 100 may then generate or update the privacy text according to the updated privacy template database.
Therefore, the development application program can generate the privacy text according to the information input by the developer, so that the privacy text can be suitable for the new online application program, the generated privacy text can be modified when privacy laws and regulations change, the privacy text of the application program can be conveniently updated when the developer updates the application program, and the time consumed by the developer for updating the privacy text is reduced.
Fig. 7A-7D illustrate some user interfaces implemented on the electronic device 100 when the development application receives feedback information for the private text and then finds other private texts with the same problem.
The user interface 21 shown in fig. 7A is a main interface for developing an application. As shown in fig. 7A, the electronic device 100 may detect a touch operation applied to the error correction and feedback function 212D, and in response to the touch operation, the electronic device 100 displays the user interface 81 shown in fig. 7B.
As shown in fig. 7B, the user interface 81 displays a plurality of privacy text lists generated by the development application in the account, wherein the user interface 81 includes a first privacy text list 811, the first privacy text list corresponds to "Camera privacy text", the first privacy text list 811 displays an input box 811A, the input box 811A is an interface for providing text input for the developer, and the developer can input feedback information for the "Camera privacy text" through the input box 811A, and the feedback information may include a problem of the "Camera privacy text". After the electronic device 100 receives the feedback information input by the developer, the electronic device 100 may send the feedback information to the cloud server, and the server searches for other private texts with the same problem in all the private texts generated by the development application program, where all the private texts include private texts generated by the development application program under different account numbers. And then, the server finds accounts corresponding to other privacy texts with the same problems and sends the accounts to the modified privacy texts, wherein the modified privacy texts have no problems.
As shown in fig. 7C, when there is a problem found according to the feedback information in the privacy text generated by the account where "User1" is located, the server finds the account where "User1" is located, and sends the modified privacy text to the account where "User1" is located. After the electronic device 100 receives the modified privacy text sent by the server, the development application may display an identifier 213D in the upper right corner of the message option 213B as shown in fig. 7C, where the identifier 213D is used to indicate that there is a problem in the privacy text generated by the developer and the number of problematic privacy texts. When the electronic apparatus 100 detects a touch operation on the message option 213B, the electronic apparatus 100 displays the user interface 91 shown in fig. 7D in response to the operation. The user interface 91 allows the user to display the reminder information received by the electronic device 100.
As shown in fig. 7D, the user interface 91 includes: prompting for a message 911. The prompt 911 is used to indicate that, in the account, a problem exists in the privacy text generated by the developer using the development application, for example, specifically, a problem exists in "Video privacy text", and the developer can obtain the modified privacy text through the prompt.
That is to say, the development application may search other privacy texts with the same problem according to the careless problem of the privacy texts that have been used online, where the privacy texts may be generated by the development application under other accounts. Therefore, the quality of the privacy text can be better managed and controlled, the problems in the privacy text can be checked in time, and the situation that developers waste excessive time and energy on the quality management and control of the privacy text is avoided.
The following describes a structure of a text generation system provided in an embodiment of the present application.
Fig. 8 exemplarily shows a structural diagram of the text generation system. The text generation system involves an electronic device 100 and a server. As shown in fig. 8, the text generation system includes: the system comprises a user management module, a privacy text generation module, a privacy text verification module and a privacy text management module.
The user management module can provide an interface for text input, acquire relevant information of the application program input by a developer, and transmit the input relevant information to the privacy text generation module. The user management module may further include a user information database for storing user information, where the user information includes related information of the developer and related information of the application program input by the developer. The user information database may be located in a server, and the related information of the developer may include: user ID, contact details, etc. The related information of the application program may include: name of application, company name, functional description of application, personal data, data storage location, storage period, online area of application, other relevant information, and the like.
Table 1 illustrates some of the user information contained in the user information database.
Figure BDA0003090232360000141
TABLE 1
It is understood that the content contained in table 1 is only an exemplary example, and is not limited to the present application, and the user information may also contain other more or less content.
The privacy text generation module can search the privacy template in the privacy template database according to the related information of the application program input by the developer, and generate the privacy text by combining the related information of the application program and the searched privacy template. And then, the privacy text generation module can transmit the privacy text to the privacy text verification module to verify the legality and normalization of the privacy text.
Wherein the privacy template database may contain one or more privacy templates that may be formulated by a privacy team. The privacy template may directly contain rules for the application to collect, process, use, store, share, transfer, or publish user data, or the privacy template may contain rules for the application to collect, process, use, store, share, transfer, or publish user data under different functions.
The one or more privacy templates may be one or more privacy universal templates established according to privacy laws and regulations of different regions. These privacy universal templates contain privacy descriptions that are applicable to the privacy laws, regulations of the area, and universal descriptions that can be substituted for the application's related information.
Or, further, the one or more privacy templates may also be one or more privacy common templates formulated according to different functions of the application. These privacy generic templates contain privacy descriptions that are applicable to the functionality of the application, as well as generic descriptions that can be substituted for information related to the application.
The privacy template is explained below in connection with a specific example.
For example, when the privacy team needs to make a privacy template applicable to the online area "china" and the application function "account management function", for example, the "information security technology public and business service information system personal information protection guide" focuses on preventing data from being improperly utilized, accidentally damaged, and tampered. The privacy team may formulate the content of the privacy template as: "when you are using modified password, security verification, complaint behavior, and there is an abnormality in operation behavior, we may ask you to provide data to ensure the security of the operation behavior. This is personal sensitive information and we will take strict security measures and not share it to third parties. The privacy template is a general description part which can be replaced with data in the related information of the application program, and the rest is a privacy description part which is applicable to the privacy laws, regulations and account management functions of China.
When the privacy text generation module finds the privacy template applicable to the online area according to the relevant information of the application program, for example, the online area, the privacy text generation module may replace the general description in the privacy template with the relevant information of the application program, and appropriately add the text description, adjust the text sequence, and the like, so as to obtain the privacy text applicable to the application program.
It will be appreciated that the privacy templates in the privacy template database may be one or more privacy-generic templates formulated according to one or more of an online area, a function of an application, a domain to which the application relates, and the like. The embodiment of the application does not limit the specific content of the privacy template.
The privacy text verification module may output the privacy text for review or modification by the relevant person. The privacy text verification module can also receive the modified privacy text and update the privacy template according to the modified content, so that the privacy template database is optimized. And then, the privacy text verification module can determine the modified or confirmed privacy text as a final privacy text, and transmit the privacy text to the privacy text management template for storage, management and optimization.
The private text management module can acquire and store the private texts generated in the text generation system, and specifically, uniformly store the private texts in a private text database of the server. In addition, the privacy text management module can also manage and optimize the privacy text. The privacy text management module can search other privacy texts with the same problem with the privacy text according to the feedback information of the privacy text, modify the other privacy texts, and then send the modified privacy texts to corresponding developers. For example, when the privacy text of the application program that has been on line lacks the device ID by the data described in the external careless account login function, the developer feeds back the information to the privacy text management module, and the privacy text management module may search for other application programs similar to the application program according to the feedback information, for example, the same on-line area, the same function of the application program, the same used privacy template, and the like, modify the description about the device ID in the privacy text corresponding to the other application programs, and send the modified privacy text to the developer corresponding thereto.
Table 2 illustrates feedback information received by the privacy text management module.
User ID Private text ID Key word Content providing method and apparatus
User1 Test1 Account login function Lack of device ID
TABLE 2
It can be seen that the feedback information may contain information such as user ID, privacy text ID, keywords, content, etc. The privacy text management module can search the corresponding privacy text in the privacy text database according to the privacy text ID, so that the privacy template used in the privacy text generation is determined, and the problems in the privacy template can be determined according to the keywords and the content.
It is understood that the content contained in table 2 is only an exemplary example, and is not limited to the present application, and the feedback information may also contain other more or less content.
In some embodiments, the privacy text generation module may further update the privacy template to ensure real-time performance and accuracy of the privacy text generated by the privacy text generation module. Specifically, when privacy laws and regulations of a region change or privacy risks exist in the privacy templates, the privacy text generation module can receive the privacy templates modified by the privacy team and replace the original privacy templates. Therefore, the privacy text generated in the text generation system can be effectively ensured to meet the requirements of latest privacy laws and regulations, and the quality of the privacy text generated in the text generation system is improved.
A method flow diagram of a text generation method is presented below.
Fig. 9 illustrates a method flow diagram of the text generation method. As shown in fig. 9, the method includes:
s101, the electronic device 100 receives relevant information of the target application program.
The related information of the target application program may include: name of the target application, company name, address or contact address, functional description of the target application, personal data, data storage location, storage period, online area of the target application, other relevant information, and the like.
The relevant information of these target applications may be collected and input into the electronic device 100 by a developer who developed the target applications.
Referring to fig. 4B and 4C, fig. 4B illustrates information related to a target application that needs to be filled or selected by a developer and displayed by the electronic device 100, and fig. 4C illustrates information obtained by the electronic device 100 after the developer completes filling the information, including a name of the target application, an online area, a company name, a contact address, a function of the target application, and the like.
In some embodiments, after the electronic device 100 receives the information related to the target application, the electronic device 100 may further send user information to the server, where the user information includes information related to a developer (e.g., a user ID, a device ID, a contact address, and the like) and information related to the target application, and the information related to the developer may be obtained from account information of the electronic device 100. The server may include a user information database for storing user information transmitted by the electronic device. For example, table 1 illustrates some of the user information stored in the user information database.
In some embodiments, the electronic device 100 may receive partial related information of the target application, and then determine other related information of the target application that the electronic device 100 needs to acquire again according to the received partial information. For example, due to different privacy laws and regulations of different online areas, the relevant information of the target application program, which needs to be provided by the developer, in the privacy text may also be different. Then at this point, the part of the related information may refer to an online area, and the other related information may refer to other information (including, but not limited to, the name of the target application, the name of a company, a functional description of the target application, personal data, a data storage location, etc.) other than the online area. In this way, the electronic device 100 can obtain the relevant information of the target application program in a targeted manner.
In this embodiment of the present application, the target application may also refer to a first application, the related information of the target application may also refer to first information, the online area of the target application may also refer to a first area, the function of the target application may also refer to a first function, and the personal data that needs to be acquired by the function of the target application may also refer to first user information.
S102, the electronic device 100 searches the privacy template according to the related information of the target application program.
In some embodiments, the electronic device 100 may include a privacy template database containing one or more privacy templates. The one or more privacy templates may be one or more privacy universal templates established according to privacy laws and regulations of different regions, wherein the regions may include: china, the United states, japan, the European Union, korea, and the like. At this time, the electronic device 100 may search for the privacy template applicable to the "area" according to the "area" in the related information of the target application.
Or, further, the one or more privacy templates may also be one or more privacy general templates formulated according to different functions of the target application, where the functions of the target application may include: photographs, games, tools, music, etc. At this time, the electronic device 100 may search the privacy template applicable to the "region" and the "function type" according to the "region" and the "function type" in the related information of the target application.
For example, when the related information of the target application indicates that the online area of the target application is "china", and the function of the target application is "take a picture", the electronic device 100 may search the privacy template applicable to the information in the privacy template database according to "china" and "take a picture".
In other embodiments, the privacy template database may be located in a server that manages and stores the privacy templates, and after the electronic device 100 receives the information related to the target application, the electronic device 100 may send the information related to the target application to the server, and send request information requesting to search for the privacy template to the server, and then the server searches for the privacy template according to the information related to the target application, and sends the searched privacy template to the electronic device 100.
It is understood that the electronic device 100 may find one or more privacy templates according to the relevant information of the target application. For example, when the function of the target application includes a plurality of functions, the electronic device 100 may find a plurality of privacy templates, where the plurality of privacy templates respectively correspond to different functions.
It can be seen that the more detailed the developer provides the information related to the target application, the more accurate the privacy template found by the electronic device 100, and at the same time, the more detailed the privacy template provided in the privacy template database is required.
In this embodiment of the application, the privacy template found by the electronic device according to the target application may be referred to as a first template, and the server may be referred to as a first server.
S103, the electronic device 100 obtains a first privacy text applicable to the target application program according to the related information of the target application program and the privacy template.
Specifically, the electronic device 100 may replace the found general description in the privacy template with the related information of the target application program, and appropriately add the text description and adjust the text sequence, so as to generate the first privacy text suitable for the target application program. In addition, when the privacy template found by the electronic device 100 includes a plurality of privacy templates, the electronic device 100 replaces the common description in the found privacy template with the related information of the target application program, and after obtaining the plurality of texts, further includes combining the texts.
Referring to fig. 4F, the electronic device 100 generates a "Camera privacy text" shown in the privacy text 511 according to the related information of the target application and the privacy template.
In some embodiments, after the electronic device 100 generates the first private text suitable for the target application, a prompt message may be displayed to prompt the user to check the first private text, and the first private text may be further output for the relevant person to check the validity and the normalization of the first private text.
Referring to fig. 4E and 4F, the prompt information may refer to the prompt box 413 shown in fig. 4E, when the electronic device 100 receives a touch operation on the online modification control 511A shown in fig. 4F, the electronic device 100 may output the first private text and display a part of the content of the first private text, or when the electronic device 100 detects a touch operation on the download control 511B shown in fig. 4F, the electronic device 100 may output the first private text and store the first private text in a specified location, for example, a local file, in the electronic device 100.
In some embodiments, after the electronic device 100 generates the first privacy text applicable to the target application, the electronic device 100 may receive the modified first privacy text and modify the privacy template database according to the modified first privacy text. In this way, the privacy template database may be better optimized.
As shown in fig. 4F, the electronic device 100 may receive the modified first privacy text through the modification area 512.
In some embodiments, after the electronic device 100 obtains the first private text applicable to the target application, the electronic device 100 may send the first private text to the server. A private text database may be included in the server and used to store private text. Therefore, the server can conveniently and uniformly manage the private text.
After the electronic device 100 obtains the first privacy text, the developer may upload the first privacy text to a server corresponding to an application download platform on-line to the target application program, and when the user downloads or updates the target application program from the application download platform, the developer may obtain and view the first privacy text. The server corresponding to the application download platform can provide a download service for downloading the application program for the user, for example, the application download platform may be an application store. In this embodiment of the application, the server corresponding to the application download platform may also be referred to as a second server.
S104, the electronic device 100 receives feedback information aiming at the first private text, wherein the feedback information is used for indicating errors existing in the first private text.
The feedback information may contain a user ID, a private text ID, keywords, content, and the like.
The user ID may refer to account information of the electronic device 100, the privacy text ID may refer to an identifier of the privacy text generated by the electronic device 100, the keyword may indicate a location of an error of the privacy text in the privacy text, for example, the keyword may be a function type, a data name, and the like of the target application, and the content may refer to a specific error existing in the privacy text.
The error present in the first privacy text may refer to an error present in the privacy template used by the first privacy template.
Referring to fig. 7B, an input box 811A in the user interface 81 is used to receive feedback information. For example, table 2 exemplarily shows specific contents of the feedback information.
S105, the electronic device 100 sends feedback information aiming at the first private text to a server.
The server may find the first private text from the private text database according to the private text ID in the feedback information.
S106, the server searches other private texts with the same errors as the first private text according to the feedback information.
Specifically, the server may determine a privacy template used by the first private text, and then find other private texts according to the privacy template. The other private text may refer to private text that uses the same privacy template as the first private text. Then, the server determines the position of the error in other private texts according to the keywords in the feedback information.
In some embodiments, the server may modify the privacy template in the privacy template database based on an error present in the first privacy text, for example, when the error present in the first privacy text is: the data described in the account login function lacks a device ID, and the server may modify the privacy template used by the first privacy text, adding a description about the device ID to the privacy template.
In some embodiments, the server may send the modified privacy template to the electronic device 100, updating and refining a privacy template database present in the electronic device 100.
In some embodiments, after the server determines the location of the error in the other private text based on the keyword in the feedback information, the server may modify the error in the other private text.
S107, the server sends prompt information or other modified privacy texts to the electronic equipment corresponding to the other privacy texts.
The electronic device corresponding to the other private text may refer to an electronic device that generates the other private text.
The prompt message is used to remind developers who generate other private texts that have problems. For example, the prompt message may be the prompt message 911 shown in fig. 7D.
The server may look up the other private texts from the private text database, and determine the electronic devices corresponding to the other private texts according to information of the other private texts, such as device IDs, user IDs, and the like.
From S101-S103, the method can obtain the private text applicable to the target application according to the relevant information of the target application. The method and the device have the advantages that developers can obtain corresponding private texts according to information of different areas, different functions of application programs and the like, development cost of the developers for the private texts is reduced, and development time of the developers is shortened. In addition, S104 to S107 are optional steps, and as can be seen from S104 to S107, the text generation method may find all privacy texts with a problem according to the problem carelessly leaked in one privacy text, and notify the problem to a corresponding developer, or send the modified privacy text to the corresponding developer, so as to improve a later-stage management and control effect on the privacy text.
It is understood that the above steps performed by the electronic device 100 may be implemented by developing an application program, and the application program in the information related to the application program received by the electronic device 100 may refer to a target application program. With specific regard to the user interface implemented on the development application, reference may be made to the user interfaces shown in fig. 4A-4G, fig. 5A-5B, fig. 6A-6B, and fig. 7A-7D, and their associated content.
The embodiments of the present application can be combined arbitrarily to achieve different technical effects.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
One of ordinary skill in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the above method embodiments. And the aforementioned storage medium includes: various media capable of storing program codes, such as ROM or RAM, magnetic or optical disks, etc.
In short, the above description is only an example of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalents, improvements and the like made in accordance with the disclosure of the present invention are intended to be included within the scope of the present invention.

Claims (9)

1. A method of text generation, the method comprising:
the method comprises the steps that the electronic equipment receives first information of a first application program, wherein the first information comprises: indication information of the first area, and indication information of the first function or first user information; the first user information provides information required by the first function for the first application program;
the electronic equipment finds a first template from a plurality of privacy templates according to the first information, wherein the first template describes a rule for obtaining user information by an application program providing service in the first area; the first template describes a rule for acquiring user information when the application program provides the first function; or the first template describes a rule for acquiring the first user information by an application program providing services in the first area;
and the electronic equipment generates a first privacy text according to the first information and the first template, wherein the first privacy text is used for requesting a user to grant the authority of the first application program for acquiring the first user information in the first area.
2. The method of claim 1, further comprising:
the electronic equipment receives second information of the first application program, wherein the second information indicates that: a second region, and, the first user information;
the electronic equipment acquires a second template according to the second information, wherein the second template describes a rule for acquiring user information by an application program providing service in the second area;
and the electronic equipment generates a second privacy text according to the second information and the second template, wherein the second privacy text is used for requesting a user to grant the permission of the first application program for acquiring the first user information in the second area.
3. The method of claim 1 or 2, wherein the first information comprises one or more of: the name of the first application program, the indication information of the first function, the first user information, the storage location of the first user information, the storage period of the first user information, and the name, address, or contact information of the developer of the first application program.
4. The method according to claim 1 or 2, wherein the receiving, by the electronic device, the first information of the first application specifically comprises:
the electronic equipment receives indication information of the first area;
the electronic equipment outputs prompt information, wherein the prompt information is used for prompting to input the indication information of the first function or the first user information;
the electronic equipment receives indication information of the first function or the first user information.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
the electronic equipment receives the first template sent by the first server.
6. The method according to claim 1 or 2, wherein after the electronic device generates a first private text from the first information and the first template, the method further comprises:
the electronic device receiving feedback information for the first private text, the feedback information indicating an error in the first private text;
the electronic equipment sends the feedback information to a first server, wherein the feedback information is used for the first server to update the stored first template or used for the first server to search the private text generated by using the first template.
7. The method according to claim 1 or 2, wherein after the electronic device generates a first private text from the first information and the first template, the method further comprises:
and the electronic equipment sends the first private text to a second server, and the second server is used for providing a downloading service of the first application program.
8. An electronic device, comprising a display screen, one or more processors, and one or more memories; wherein the display screen, the one or more memories, and the one or more processors are coupled with the one or more processors for storing computer program code, the computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the method of any of claims 1-7.
9. A computer-readable storage medium comprising instructions that, when executed on an electronic device, cause the electronic device to perform the method of any of claims 1-7.
CN202110593818.9A 2021-05-28 2021-05-28 Text generation method, related device and system Active CN113435173B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110593818.9A CN113435173B (en) 2021-05-28 2021-05-28 Text generation method, related device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110593818.9A CN113435173B (en) 2021-05-28 2021-05-28 Text generation method, related device and system

Publications (2)

Publication Number Publication Date
CN113435173A CN113435173A (en) 2021-09-24
CN113435173B true CN113435173B (en) 2023-03-10

Family

ID=77803260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110593818.9A Active CN113435173B (en) 2021-05-28 2021-05-28 Text generation method, related device and system

Country Status (1)

Country Link
CN (1) CN113435173B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113822036B (en) * 2021-09-28 2022-07-12 百度在线网络技术(北京)有限公司 Privacy policy content generation method and device and electronic equipment
CN115994379A (en) * 2021-10-20 2023-04-21 华为技术有限公司 Privacy protocol family generation method of application, client device and server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6501421B1 (en) * 2002-01-08 2002-12-31 International Business Machines Corporation Method and system for providing a location-based legal information service
CA2619300A1 (en) * 2007-02-06 2008-08-06 Research In Motion Limited System and method for setting application permissions
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN112835613A (en) * 2021-01-29 2021-05-25 宝宝巴士股份有限公司 APP privacy policy content management method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6501421B1 (en) * 2002-01-08 2002-12-31 International Business Machines Corporation Method and system for providing a location-based legal information service
CA2619300A1 (en) * 2007-02-06 2008-08-06 Research In Motion Limited System and method for setting application permissions
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN112835613A (en) * 2021-01-29 2021-05-25 宝宝巴士股份有限公司 APP privacy policy content management method

Also Published As

Publication number Publication date
CN113435173A (en) 2021-09-24

Similar Documents

Publication Publication Date Title
US20220247833A1 (en) Installable web applications
CN110569130B (en) Cross-process communication method, device and equipment
US10194288B2 (en) Sticker distribution system for messaging apps
WO2019178869A1 (en) Method for opening esim card account, and terminal
CN109408136B (en) Information processing method, information processing apparatus, storage medium, and electronic device
CN113435173B (en) Text generation method, related device and system
CN113254121A (en) Messaging application interfacing with one or more extension applications
CN106471466A (en) Brief application
CN113094123A (en) Method and device for realizing functions in application program, electronic equipment and storage medium
JP2019513260A (en) Service execution method and device
MX2014008883A (en) Nfc data transmission method, terminal device and server.
CN113032766B (en) Application authority management method and device
CN113727333B (en) Downloading system for custom applications
WO2020259650A1 (en) Request response method and electronic device
EP4246312A1 (en) Content display method and terminal device
CN115879088A (en) Authority checking method and electronic equipment
CN114862398A (en) Distributed safety equipment-based risk control method and related device
CN110602689B (en) Method and device for safely operating equipment
CN113468606A (en) Application program access method and electronic equipment
JP2022141683A (en) Application function implementation method and electronic device
CN116702100B (en) Authority management method and electronic equipment
WO2022194010A1 (en) Application program sharing method and application program sharing apparatus
WO2024007816A1 (en) Communication method and apparatus
CN115017473B (en) Authorization method and electronic equipment
WO2023185967A1 (en) Rich media information processing method and system, and related apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant